Computer scientists at the Friedrich-Alexander University of Erlangen-Nuremberg, Germany (FAU) have demonstrated that it is possible for unauthorized parties to recover data from encrypted Android smartphones using cold boot attacks. And when they say cold, they mean it – below 10°C, to be precise.

Cool that they can now do it on ARM architectues, the attack is nothing new, cold keeps the ram from self-erasing, but cold boot attacks are their for pulling encrypted stuff from RAM so as to gain access to TrueCrypt or Bitlocker encrypted files, alas few things simmilar to this exist for Android, and there is the small problem that you've got to get the data from the RAM, difficult when it's a fuckton harder to get to inside a smartphone...